Re: Proposed DNSSEC Plenary Experiment for IETF 74

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Thu, 27 Nov 2008, Michael Richardson wrote:

>   You are. It's all ready.
> 
>   DNSSEC can be done in the plenary by changing the recursive servers.
> It's pretty close to being completely apt-get/yum/pkg_add able as being
> on.   What's missing is someone to decide what are the set of TAs to
> use...

Even that is done with autotrust and dnssec-keys packages. The only
thing that needs to happen is for someone at the distribution to flip
the switch. (dnssec-keys package allows that for Fedora/RHEL machine by
using a simple dnssec-configure command, including DLV support)[*]

The problem is really that there are not many signed zones out there that
are reachable. As I talked at IETF-73 with people such as Roy and Sam, there
is not really any benchmarking one can do. One can benchmark DNS and one
can benchmark crypto, but benchmarking DNSSEC is not the sum of those two.

Without the additional signed zones, the IETF Plenary testing really just
becomes a much smaller version of a bind/unbound test at a large ISP. We'd
be better of asking COMCAST to give a presentation about their experience
enabling DNSSEC on their resolvers.

And I think testing key rollover during the Plenary might be too disturbing
for the plenary itself if it breaks.

Paul
[*] That and hardware crypto acceleration is basically our DNSX Secure
    Resolver appliance due Q1 2009.
_______________________________________________

Ietf@xxxxxxxx
https://www.ietf.org/mailman/listinfo/ietf

[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Fedora Users]